Description
The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-335-1 | ntp security update |
Debian DSA |
DSA-3388-1 | ntp security update |
Ubuntu USN |
USN-2783-1 | NTP vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Ntp
Subscribe
Ntp
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Opensuse
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Hpc Node
Subscribe
Enterprise Linux Hpc Node Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Workstation
Subscribe
Suse
Subscribe
Linux Enterprise Debuginfo
Subscribe
Linux Enterprise Desktop
Subscribe
Linux Enterprise Server
Subscribe
Linux Enterprise Software Development Kit
Subscribe
Manager
Subscribe
Manager Proxy
Subscribe
Openstack Cloud
Subscribe
Suse Linux Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T06:41:09.519Z
Reserved: 2015-07-01T00:00:00.000Z
Link: CVE-2015-5300
No data.
Status : Deferred
Published: 2017-07-21T14:29:00.927
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-5300
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN